Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks

2018;
: pp. 92-111
Authors:
1
Lviv Polytechnic National University, Department of Information Technology Security

The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation;
b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.

[1] IEEE Std 802.15.4TM, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). Second edition, September 2006.

[2] IEEE Std 802.15.4TM 2011, IEEE Standard for Local and metropolitan area networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). Revision of IEEE Std 802.15.4-2006, Approved 14 August 2012 by American National Standards Institute.

[3] Gascón, David (February 5, 2009). «Security in 802.15.4 and ZigBee networks». [Online]. Available: http://www. libelium.com/security-802-15-4-zigbee/ [Accessed: Nov. 25, 2018].

[4] ISA100 Committee Home Page: https://www.isa.org/ isa100/ [Accessed: Nov. 25, 2018]

[5] Federal Information Processing Standards (FIPS) Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES). November 26, 2001. Available at http://csrc.nist.gov/publications/ fips/fips197/fips-197.pdf [Accessed: Nov. 25, 2018]

[6] NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.

[7] Rogaway, P., and Wagner, D., «A Critique of CCM», IACR ePrint Archive 2003-070, April 13, 2003.

[8] Melnyk V. Korkishko T., Melnyk A., Algorithms and Processor for the Symmetric Block Ciphering. Lviv. BAK, 2003, 187 p.

[9] Security requirements for cryptographic modules. Federal information proceedings standard publication 140-2, 1999. — 50 p.

[10] Melnyk A. Digital Signal Processors. Preprint N 29-89. Applied Problems of Mechanics and Mathematics Institute of the Academy of Sciences of Ukraine, Lviv. — 1989, 63 p.